Skip to main content

Optimizing Network Energy Consumption through Intrusion Prevention Systems

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 299))

Abstract

Security is of paramount importance in computer networks; in fact network attacks may cause huge economic damages as shown by the fluctuations of stocks of firms subjected to cyber-attacks. For this reason network traffic needs to be purged of malicious traffic before getting to the destination. At the same time the next generation of routers will be able to modulate energy consumption on the basis of actual traffic, thus it would be beneficial to identify and discard malicious packets as soon as possible. In past works, the energy savings enabled by aggressive intrusion detection has been modeled and analyzed, however past model do not take into account the fact that the load of routers diminishes their capability to analyze packets. In this paper we introduce an adaptive model that takes into account the actual load of routers. The model is implemented in a simulator and we show the results of simulations proving that the actual level of energy saving depends upon the network load.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Telang, R., Wattal, S.: An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. IEEE Transactions on Software Engineering 33(8), 544–557 (2007), doi:10.1109/TSE.2007.70712

    Google Scholar 

  2. Tsai, C.-F., Hsu, Y.-F., Lin, C.-Y., Lin, W.-Y.: Intrusion detection by machine learning: A review. Expert Systems with Applications 36(10), 11994–12000 (2009)

    Article  Google Scholar 

  3. Mehra, P.: A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems. International Journal of Advanced Research in Computer and Communication Engineering 1(6) (August 2012)

    Google Scholar 

  4. White, J.S., Fitzsimmons, T.T., Matthews, J.N.: Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata. In: Proc. of the SPIE, vol. 8757 (2013)

    Google Scholar 

  5. Prelude IDS, https://www.prelude-ids.org

  6. Pihelgas, M.: A Comparative Analysis of Open-Source Intrusion Detection Systems, Ms. Thesis, University of Tallin (2012)

    Google Scholar 

  7. Bolla, R., Bruschi, R., Ranieri, A.: Green support for PC-based software router: Performance evaluation and modeling. In: Proc. IEEE International Conference on Communication, ICC 2009, pp. 1–6 (2009)

    Google Scholar 

  8. Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer Immnology. Communications of the ACM 40(10), 88–96 (1997)

    Article  Google Scholar 

  9. Koch, R.: Towards next-generation Intrusion Detection. In: Proc. of the 3rd International Conference on Cyber Conflicts (ICCC), pp. 1–18 (2011)

    Google Scholar 

  10. Akamai, The State of the Internet. Tech. Rep., 3Q (2013)

    Google Scholar 

  11. Callegari, C., Giordano, S., Pagano, M.: New statistical approaches for anomaly detection. Security and Communication Networks 2(6), 611–634 (2009)

    Google Scholar 

  12. Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycoss, J.: Immune system approaches to intrusion detection: a review. Journal: Natural Computing 6(4), 413–466 (2007)

    MATH  Google Scholar 

  13. Li, W.: Using Genetic Algorithm for Network Intrusion Detection. In: Proc. of DOE Cyber Security Group (2004)

    Google Scholar 

  14. Migliardi, M., Merlo, A.: Improving energy efficiency in Distributed Intrusion Detection Systems. Journal of High Speed Networks 9(3), 251–264 (2013)

    Google Scholar 

  15. Caviglione, L., Merlo, A., Migliardi, M.: What is Green Security? In: Proc. of the 7th International Conference on Information Assurance and Security (IAS 2011), pp. 366–371 (2011)

    Google Scholar 

  16. Pantazis, N.A., Nikolidakis, S.A., Vergados, D.D.: Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey. IEEE Communications Surveys and Tutorials 5(2), 551–591 (2013)

    Article  Google Scholar 

  17. Li, X., Chong, F.T.: A Case for Energy-Aware Security Mechanisms. In: Proc. of the 27th International Conference on Advanced Information Networking and Applications Workshops, pp. 1541–1546

    Google Scholar 

  18. Albin, E.: A Comparative Analysis of the Snort and Suricata intrusion-detection systems. Master Thesis (September 2011)

    Google Scholar 

  19. Herrero, A., Zurutuza, U., Corchado, E.: A neural-visualization ids for honeynet data. The International Journal of Neural Systems 22(2)

    Google Scholar 

  20. Herrero, A., Navarro, M., Corchado, E., Julian, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst. 29(1), 250–261 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessio Merlo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Merlo, A., Migliardi, M., Raso, D., Spadacini, E. (2014). Optimizing Network Energy Consumption through Intrusion Prevention Systems. In: de la Puerta, J., et al. International Joint Conference SOCO’14-CISIS’14-ICEUTE’14. Advances in Intelligent Systems and Computing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-07995-0_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07995-0_50

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07994-3

  • Online ISBN: 978-3-319-07995-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics